Operations | Monitoring | ITSM | DevOps | Cloud

Five Ways to Simplify Data Masking | The Tony and Tonie Show Ep 38

5 signs your data masking is fast, secure, and low-maintenance. Can you protect PII, still deliver realistic test data, and design a data masking solution that’s easy to automate and maintain? Tony and Tonie discuss five key traits of a tool that does just that. Read the full article.

Sending Custom Application Metrics to MetricFire's Hosted Graphite

In this article, we’ll show how easy it is to send custom application metrics directly to MetricFire's public carbon endpoint. We’ll build a small Flask application, emit a handful of practical metrics, and generate local traffic to demonstrate how quickly meaningful data can flow from your code to your dashboards.

Key Insights from the 2025 GigaOm Radar for Container Networking

In 2025, as modern applications became ever more distributed and the use of Kubernetes continued to proliferate, the role of container networking was critical. Today’s enterprises demand networking solutions that can scale, secure, and connect services reliably, whether those services run across multiple clouds, hybrid environments, or on-premises clusters.

Running Ansible Playbooks with Puppet Playbook Runner

Are you struggling to manage infrastructure scale with standalone Ansible playbooks? Discover how to consolidate your automation tools without losing your existing investment. In this demo, we explore how Puppet Edge empowers infrastructure teams to seamlessly execute Ansible Playbooks within Puppet workflows.

SSH Check Overview

In this video, learn how to set up and configure SSH checks using Uptime.com. We discuss the frequency options, the importance of Secure Shell (SSH) for secure data communication, and step-by-step instructions for creating a new SSH check in your account. Discover how to set check intervals, configure alert contacts, specify monitoring locations, and ensure your probe servers are whitelisted. Perfect for ensuring your server's remote login capabilities are continuously monitored and secure.

Why gRPC is a Debugging Nightmare #speedscale #observability #grpc #testing #devops

gRPC is fast and efficient - until it breaks at 2:00 AM. Traditional observability tools are built for HTTP/1.1 and JSON. When you switch to gRPC, you’re dealing with binary Protobuf payloads and HTTP/2 multiplexing that most logs and traces simply weren't designed to handle. Speedscale flips the switch by decoding Protobuf directly into human-readable JSON in real-time. Get the speed of gRPC with the visibility of REST.

3AM Pager: When You Know the Data but Can't Search It

Ever tried searching your entire production stack for one user? Getting paged at 3 AM is bad enough. It’s worse when you only have a single username and zero visibility into what’s actually happening across your microservices. With Speedscale, you can perform full-text searches across every API call and database interaction in real-time. Stop guessing and start debugging with total context.

Inside Qovery's security architecture: how we secure your cloud & Kubernetes infrastructure

Discover how Qovery bridges the gap between developers and infrastructure with a "security by design" approach. From federated identities and unique encryption keys to real-time audit logs and SOC2 Type 2 certification - see how we protect your data while eliminating vendor lock-in.